Cryptography IV Flashcards

1
Q

Why is storing passwords in plaintext insecure?

A

If the database is stolen, all passwords are immediately compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is storing key-encrypted passwords insecure?

A
  • if passwords stolen, key might also be stolen
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is storing hashed password a problem?

A
  • identical passwords produce identical hashes
  • humans tend to pick same password => frequency analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of salting passwords before hashing?

A

Prevents identical passwords from producing the same hash, stopping precomputed attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a salt?

A

a random string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ‘salting a password’ mean?

A

you hash a password and its salt together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the best way to use salting?

A
  • generate a salt per user
    => stops freq analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a brute force attack?

A

Trying every possible password until the correct one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a dictionary attack work?

A

It precomputes hashes of common passwords and quickly looks up a match for each hash, in the dictionary

=> large storage, preprocessing time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are common strategies in intelligent guessing?

A

Using the top N most common passwords
Dictionary words, names, places, dates
Combinations of words and symbols
Replacing letters with similar-looking numbers (leet speak)
Markov models to predict likely passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of secret sharing?

A

To divide a secret into multiple parts so that only a certain number of participants can reconstruct it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is 1-out-of-n Secret Sharing?

A

Everyone know secret s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is n-out-of n Secret Sharing?

A

Split s in n, everyone is needed to reconstruct s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the process of n-out-of n Secret Sharing

A

Trusted Dealer:
1. Picks random s0, s1
2. s2 = s ⊕ s0 ⊕ s1

Secret Recovery:
s = s0 ⊕ s1 ⊕ s2
= s0 ⊕ s1 ⊕ s ⊕ s0 ⊕ s1
= (s0 ⊕ s0 ) ⊕ s ⊕ (s1 ⊕ s1)
= (00..00) ⊕ s ⊕ (00..00)
= s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is (t, n) secret sharing better than n-out-of-n sharing?

A

It allows recovery of the secret even if some shares are lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is (t, n) threshold secret sharing?

A

A scheme where any t of the n shares can reconstruct the secret.

17
Q

How does Shamir’s Secret Sharing work?

A

It uses polynomials to generate shares, ensuring t-out-of-n security. (Since t points determine exactly one polynomial of degree t-1)

18
Q

How does 2-Out-Of-n Secret Sharing work?

A

Since 2 points determine a line, any 2 shares can determine the secret

19
Q

How does Onion Routing work? (TOR = the onion router)

A

Messages are encrypted in layers and pass through multiple relays, with each relay decrypting only one layer.

  • messages are sent via random sequence of relays (circuit)
  • last relay = EXIT NODE
  • each node only know previous and next
20
Q

What are the properties of onion routing?

A
  1. Privacy - anonymous communication
21
Q

Why can an exit node in Tor be dangerous?

A

It can see the decrypted traffic if encryption is not applied at the application level (e.g., no HTTPS).

22
Q

Why does Tor use multiple relays?

A

To prevent any single relay from knowing both the sender and receiver.

23
Q

What are censoring techniques?

A
  1. DNS Blacklist: (blocking domain names)
  2. IP Blacklist: (blocking specific servers)
  3. Keyword Blacklist: (blocking searches or URLs with certain words)
24
Q

What is OONI?

A

The Open Observatory of Network Interference, which monitors internet censorship worldwide.
goal: free and open internet

25
Q

What is a bridge relay in Tor?

A

A hidden relay not listed in directories, used to bypass censorship.